Description 
1 online resource (xi, 520 pages) : illustrations 
Series 
Lecture notes in computer science ; 5443 

LNCS sublibrary. SL 4, Security and cryptology 

LNCS sublibrary. SL 4, Security and cryptology.

Contents 
Number Theory  Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint  The Security of All Bits Using List Decoding  A New Lattice Construction for Partial Key Exposure Attack for RSA  SubsetRestricted Random Walks for Pollard rho Method on  Applications and Protocols  Signing a Linear Subspace: Signature Schemes for Network Coding  Improving the BonehFranklin Traitor Tracing Scheme  Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols  ZeroKnowledge Proofs with Witness Elimination  MultiParty Protocols  Distributed PublicKey Cryptography from Weak Secrets  Asynchronous Multiparty Computation: Theory and Implementation  MultiParty Computation with Omnipresent Adversary  IdentityBased Encryption  Blind and Anonymous IdentityBased Encryption and Authorised Private Searches on Public Key Encrypted Data  Anonymous Hierarchical IdentityBased Encryption with Constant Size Ciphertexts  Towards BlackBox Accountable Authority IBE with Short Ciphertexts and Private Keys  Removing Escrow from IdentityBased Encryption  Signatures  On the Theory and Practice of Personal Digital Signatures  Security of Blind Signatures under Aborts  Security of Sanitizable Signatures Revisited  Identification of Multiple Invalid Signatures in PairingBased Batched Signatures  Encryption  CCASecure Proxy Reencryption without Pairings  Compact CCASecure Encryption for Messages of Arbitrary Length  Verifiable Rotation of Homomorphic Encryptions  New Cryptosystems and Optimizations  A Practical Key Recovery Attack on Basic TCHo  An Algebraic Surface Cryptosystem  Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication  Group Signatures and Anonymous Credentials  Revocable Group Signature Schemes with Constant Costs for Signing and Verifying  An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials  Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials 
Summary 
This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in PublicKey Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009. The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multiparty protocols, identitybased encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials 
Bibliography 
Includes bibliographical references and index 
Notes 
English 
In 
Springer eBooks 
Subject 
Data encryption (Computer science)  Congresses


Public key cryptography  Congresses


Computer security  Congresses


Informatique.


Computer security.


Data encryption (Computer science)


Public key cryptography.


PublicKeyKryptosystem

Genre/Form 
Conference papers and proceedings.


Conference papers and proceedings.


Actes de congrès.


Irvine (2009)


Kongress.

Form 
Electronic book

Author 
Jarecki, Stanisław


Tsudik, G. (Gene)

LC no. 
2009921160 
ISBN 
9783642004674 

3642004679 

9783642004681 

3642004687 
